必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America

运营商(isp): Yehuda Mukdasi

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackspam
Unauthorized connection attempt detected from IP address 45.157.120.132 to port 8080
2020-05-31 23:03:11
相同子网IP讨论:
IP 类型 评论内容 时间
45.157.120.16 attack
Aug 29 15:21:01 ip40 sshd[6691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.157.120.16 
Aug 29 15:21:03 ip40 sshd[6691]: Failed password for invalid user polycom from 45.157.120.16 port 49612 ssh2
...
2020-08-29 22:58:56
45.157.120.16 attackspam
Aug 17 20:44:11 onepixel sshd[3470766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.157.120.16 
Aug 17 20:44:11 onepixel sshd[3470766]: Invalid user nst from 45.157.120.16 port 41680
Aug 17 20:44:13 onepixel sshd[3470766]: Failed password for invalid user nst from 45.157.120.16 port 41680 ssh2
Aug 17 20:48:04 onepixel sshd[3472853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.157.120.16  user=root
Aug 17 20:48:06 onepixel sshd[3472853]: Failed password for root from 45.157.120.16 port 52052 ssh2
2020-08-18 05:10:43
45.157.120.16 attackspam
Aug 15 13:55:12 itv-usvr-02 sshd[28370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.157.120.16  user=root
Aug 15 13:59:35 itv-usvr-02 sshd[28535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.157.120.16  user=root
Aug 15 14:04:12 itv-usvr-02 sshd[28681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.157.120.16  user=root
2020-08-15 15:44:14
45.157.120.16 attack
Aug 11 14:26:30 ns41 sshd[19353]: Failed password for root from 45.157.120.16 port 53484 ssh2
Aug 11 14:26:30 ns41 sshd[19353]: Failed password for root from 45.157.120.16 port 53484 ssh2
2020-08-11 20:33:43
45.157.120.16 attackbots
Aug  2 14:05:57 abendstille sshd\[22756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.157.120.16  user=root
Aug  2 14:05:59 abendstille sshd\[22756\]: Failed password for root from 45.157.120.16 port 55582 ssh2
Aug  2 14:09:55 abendstille sshd\[26369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.157.120.16  user=root
Aug  2 14:09:56 abendstille sshd\[26369\]: Failed password for root from 45.157.120.16 port 38332 ssh2
Aug  2 14:13:58 abendstille sshd\[30450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.157.120.16  user=root
...
2020-08-02 20:50:00
45.157.120.16 attack
Jul 30 10:46:47 gw1 sshd[26385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.157.120.16
Jul 30 10:46:48 gw1 sshd[26385]: Failed password for invalid user lfx from 45.157.120.16 port 47954 ssh2
...
2020-07-30 14:00:44
45.157.120.16 attack
Jul  6 07:28:37 host sshd[6642]: Invalid user www from 45.157.120.16 port 47376
...
2020-07-06 18:45:22
45.157.120.16 attackspam
Invalid user adi from 45.157.120.16 port 46628
2020-06-22 01:06:21
45.157.120.16 attackspam
Jun 21 09:24:12 vps647732 sshd[17359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.157.120.16
Jun 21 09:24:14 vps647732 sshd[17359]: Failed password for invalid user test1 from 45.157.120.16 port 43098 ssh2
...
2020-06-21 15:36:40
45.157.120.16 attackspam
Invalid user lsfadmin from 45.157.120.16 port 54206
2020-06-18 03:52:12
45.157.120.121 attackspambots
Unauthorized connection attempt detected from IP address 45.157.120.121 to port 8080
2020-05-31 23:03:41
45.157.120.13 attackbotsspam
Unauthorized connection attempt detected from IP address 45.157.120.13 to port 8080
2020-05-31 21:55:51
45.157.120.117 attackbotsspam
Unauthorized connection attempt detected from IP address 45.157.120.117 to port 8080
2020-05-30 00:13:33
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.157.120.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55647
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.157.120.132.			IN	A

;; AUTHORITY SECTION:
.			425	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020053100 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 31 23:03:02 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
Host 132.120.157.45.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.120.157.45.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.76.161.37 attackspam
[portscan] Port scan
2019-06-27 19:55:39
36.226.109.12 attack
23/tcp
[2019-06-27]1pkt
2019-06-27 19:50:01
60.250.81.38 attackspambots
$f2bV_matches
2019-06-27 19:58:45
121.30.120.72 attack
Honeypot attack, port: 23, PTR: 72.120.30.121.adsl-pool.sx.cn.
2019-06-27 19:45:59
139.59.81.137 attackspam
2019-06-27T12:33:34.998323 [VPS3] sshd[5531]: Invalid user app from 139.59.81.137 port 43250
2019-06-27T12:35:16.433725 [VPS3] sshd[5582]: Invalid user odoo from 139.59.81.137 port 48886
2019-06-27T12:35:54.273562 [VPS3] sshd[5595]: Invalid user ubuntu from 139.59.81.137 port 60024
2019-06-27T12:36:33.788845 [VPS3] sshd[5608]: Invalid user rajen1 from 139.59.81.137 port 43848
2019-06-27T12:37:12.006537 [VPS3] sshd[5623]: Invalid user rajen2 from 139.59.81.137 port 54504
2019-06-27T12:37:49.232669 [VPS3] sshd[5636]: Invalid user ansible from 139.59.81.137 port 37554
2019-06-27T12:38:23.969088 [VPS3] sshd[5651]: Invalid user rajen3 from 139.59.81.137 port 48888
2019-06-27T12:38:57.290054 [VPS3] sshd[5663]: Invalid user rajen4 from 139.59.81.137 port 60216
2019-06-27T12:39:29.375275 [VPS3] sshd[5674]: Invalid user tomas from 139.59.81.137 port 43294
2019-06-27T12:40:00.980530 [VPS3] sshd[5685]: Invalid user rajen5 from 139.59.81.137 port 54538
2019-06-27 19:34:15
42.237.188.38 attack
Honeypot attack, port: 23, PTR: hn.kd.ny.adsl.
2019-06-27 19:37:36
79.40.182.195 attackspam
27.06.2019 03:39:03 Command injection vulnerability attempt/scan (login.cgi)
2019-06-27 20:03:06
86.108.111.68 attackbotsspam
DATE:2019-06-27_05:39:34, IP:86.108.111.68, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-06-27 19:52:44
168.232.129.168 attackbots
2019-06-27T03:39:31.890189abusebot-7.cloudsearch.cf sshd\[13247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.129.168  user=root
2019-06-27 19:53:54
114.232.141.94 attack
2019-06-27T05:37:50.440374 X postfix/smtpd[22187]: warning: unknown[114.232.141.94]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-27T05:38:03.358118 X postfix/smtpd[22187]: warning: unknown[114.232.141.94]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-27T05:38:29.427025 X postfix/smtpd[22093]: warning: unknown[114.232.141.94]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-27 20:10:30
101.51.10.120 attack
Honeypot attack, port: 445, PTR: node-22g.pool-101-51.dynamic.totinternet.net.
2019-06-27 19:36:27
79.61.33.46 attackspam
NAME : IT-TIN-20070221 CIDR : 79.0.0.0/10 DDoS attack Italy - block certain countries :) IP: 79.61.33.46  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-27 19:55:11
5.196.110.170 attackspambots
Invalid user qhsupport from 5.196.110.170 port 39108
2019-06-27 20:03:33
78.185.88.43 attackbotsspam
Honeypot attack, port: 23, PTR: 78.185.88.43.dynamic.ttnet.com.tr.
2019-06-27 19:31:54
129.144.180.57 attackbots
Jun 27 03:55:31 TORMINT sshd\[32330\]: Invalid user teacher from 129.144.180.57
Jun 27 03:55:31 TORMINT sshd\[32330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.144.180.57
Jun 27 03:55:33 TORMINT sshd\[32330\]: Failed password for invalid user teacher from 129.144.180.57 port 25130 ssh2
...
2019-06-27 19:45:41

最近上报的IP列表

113.136.162.26 13.81.102.130 109.26.119.34 193.49.254.154
176.212.242.174 222.194.122.68 186.183.251.82 186.54.108.253
185.8.243.135 183.213.26.53 183.67.62.159 177.85.61.241
171.121.220.72 151.237.103.115 151.197.194.78 149.200.210.160
118.139.245.89 117.221.192.56 117.92.122.152 116.136.19.143